Join the discussion
Question 1/330
Tess King is using the nslookup command to craft queries to list all DNS information (such as Name Servers, host names, MX records, CNAME records, glue records (delegation for child Domains), zone serial number, TimeToLive (TTL) records, etc) for a Domain.
What do you think Tess King is trying to accomplish? Select the best answer.
What do you think Tess King is trying to accomplish? Select the best answer.
Correct Answer: C
Add Comments
- Other Question (330q)
- Q1. Tess King is using the nslookup command to craft queries to list all DNS information (such...
- Q2. After an audit, the auditors inform you that there is a critical finding that you must tac...
- Q3. in the Common Vulnerability Scoring System (CVSS) v3.1 severity ratings, what range does m...
- Q4. Firewalls are the software or hardware systems that are able to control and monitor the tr...
- Q5. Bobby, an attacker, targeted a user and decided to hijack and intercept all their wireless...
- Q6. Which command can be used to show the current TCP/IP connections?...
- Q7. Identify the UDP port that Network Time Protocol (NTP) uses as its primary means of commun...
- Q8. Study the snort rule given below: (Exhibit) From the options below, choose the exploit aga...
- Q9. When purchasing a biometric system, one of the considerations that should be reviewed is t...
- Q10. Your company performs penetration tests and security assessments for small and medium-size...
- Q11. A penetration tester is conducting a port scan on a specific host. The tester found severa...
- Q12. Joel, a professional hacker, targeted a company and identified the types of websites frequ...
- Q13. When analyzing the IDS logs, the system administrator noticed an alert was logged when the...
- Q14. When you are getting information about a web server, it is very important to know the HTTP...
- Q15. John, a professional hacker, targeted CyberSol Inc., an MNC. He decided to discover the lo...
- Q16. An organization has automated the operation of critical infrastructure from a remote locat...
- Q17. Annie, a cloud security engineer, uses the Docker architecture to employ a client/server m...
- Q18. You are performing a penetration test for a client and have gained shell access to a Windo...
- Q19. Steve, an attacker, created a fake profile on a social media website and sent a request to...
- Q20. The network users are complaining because their system are slowing down. Further, every ti...
- Q21. Wilson, a professional hacker, targets an organization for financial benefit and plans to ...
- Q22. If a tester is attempting to ping a target that exists but receives no response or a respo...
- Q23. Eric has discovered a fantastic package of tools named Dsniff on the Internet. He has lear...
- Q24. What is the file that determines the basic configuration (specifically activities, service...
- Q25. What is not a PCI compliance recommendation?
- Q26. What would be the fastest way to perform content enumeration on a given web server by usin...
- Q27. If a tester is attempting to ping a target that exists but receives no response or a respo...
- Q28. Which of the following DoS tools is used to attack target web applications by starvation o...
- Q29. Mirai malware targets loT devices. After infiltration, it uses them to propagate and creat...
- Q30. Consider the following Nmap output: (Exhibit) what command-line parameter could you use to...
- Q31. which type of virus can change its own code and then cipher itself multiple times as it re...
- Q32. CyberTech Inc. recently experienced SQL injection attacks on its official website. The com...
- Q33. Jason, an attacker, targeted an organization to perform an attack on its Internet-facing w...
- Q34. Clark, a professional hacker, was hired by an organization to gather sensitive information...
- Q35. in this attack, an adversary tricks a victim into reinstalling an already-in-use key. This...
- Q36. When a normal TCP connection starts, a destination host receives a SYN (synchronize/start)...
- Q37. Shiela is an information security analyst working at HiTech Security Solutions. She is per...
- Q38. Which of these is capable of searching for and locating rogue access points?...
- Q39. John, a professional hacker, decided to use DNS to perform data exfiltration on a target n...
- Q40. What term describes the amount of risk that remains after the vulnerabilities are classifi...
- Q41. Ethical hacker jane Smith is attempting to perform an SQL injection attach. She wants to t...
- Q42. Calvin, a grey-hat hacker, targets a web application that has design flaws in its authenti...
- Q43. An organization is performing a vulnerability assessment for mitigating threats. James, a ...
- Q44. You are tasked to perform a penetration test. While you are performing information gatheri...
- Q45. Kevin, an encryption specialist, implemented a technique that enhances the security of key...
- Q46. When analyzing the IDS logs, the system administrator noticed an alert was logged when the...
- Q47. Which of the following web vulnerabilities would an attacker be attempting to exploit if t...
- Q48. This is an attack that takes advantage of a web site vulnerability in which the site displ...
- Q49. Widespread fraud ac Enron. WorldCom, and Tyco led to the creation of a law that was design...
- Q50. This kind of password cracking method uses word lists in combination with numbers and spec...
- Q51. These hackers have limited or no training and know how to use only basic techniques or too...
- Q52. You have retrieved the raw hash values from a Windows 2000 Domain Controller. Using social...
- Q53. Judy created a forum, one day. she discovers that a user is posting strange images without...
- Q54. A large company intends to use Blackberry for corporate mobile phones and a security analy...
- Q55. Scenario: 1. Victim opens the attacker's web site. 2. Attacker sets up a web site which co...
- Q56. Which of the following programs is usually targeted at Microsoft Office products?...
- Q57. Steve, an attacker, created a fake profile on a social media website and sent a request to...
- Q58. John, a professional hacker, performs a network attack on a renowned organization and gain...
- Q59. Ethical backer jane Doe is attempting to crack the password of the head of the it departme...
- Q60. John, a professional hacker, targeted an organization that uses LDAP for accessing distrib...
- Q61. What firewall evasion scanning technique make use of a zombie system that has low network ...
- Q62. In order to tailor your tests during a web-application scan, you decide to determine which...
- Q63. Which of the following tactics uses malicious code to redirect users' web traffic?...
- Q64. Sam, a web developer, was instructed to incorporate a hybrid encryption software program i...
- Q65. Bob, a system administrator at TPNQM SA, concluded one day that a DMZ is not needed if he ...
- Q66. infecting a system with malware and using phishing to gain credentials to a system or web ...
- Q67. ViruXine.W32 virus hides their presence by changing the underlying executable code. This V...
- Q68. if you send a TCP ACK segment to a known closed port on a firewall but it does not respond...
- Q69. Sam is a penetration tester hired by Inception Tech, a security organization. He was asked...
- Q70. Thomas, a cloud security professional, is performing security assessment on cloud services...
- Q71. Jack, a professional hacker, targets an organization and performs vulnerability scanning o...
- Q72. John, a professional hacker, decided to use DNS to perform data exfiltration on a target n...
- Q73. An attacker has installed a RAT on a host. The attacker wants to ensure that when a user a...
- Q74. Which of the following is a component of a risk assessment?...
- Q75. You are programming a buffer overflow exploit and you want to create a NOP sled of 200 byt...
- Q76. Daniel Is a professional hacker who Is attempting to perform an SQL injection attack on a ...
- Q77. Which system consists of a publicly available set of databases that contain domain name re...
- Q78. Which of the following Google advanced search operators helps an attacker in gathering inf...
- Q79. Ethical hacker jane Smith is attempting to perform an SQL injection attach. She wants to t...
- Q80. Bob is acknowledged as a hacker of repute and is popular among visitors of "underground" s...
- Q81. Eve is spending her day scanning the library computers. She notices that Alice is using a ...
- Q82. Clark is a professional hacker. He created and configured multiple domains pointing to the...
- Q83. What piece of hardware on a computer's motherboard generates encryption keys and only rele...
- Q84. You are a penetration tester tasked with testing the wireless network of your client Brake...
- Q85. Leverox Solutions hired Arnold, a security professional, for the threat intelligence proce...
- Q86. An attacker utilizes a Wi-Fi Pineapple to run an access point with a legitimate-looking SS...
- Q87. what is the correct way of using MSFvenom to generate a reverse TCP shellcode for windows?...
- Q88. Identify the web application attack where the attackers exploit vulnerabilities in dynamic...
- Q89. Which of the following options represents a conceptual characteristic of an anomaly-based ...
- Q90. Johnson, an attacker, performed online research for the contact details of reputed cyberse...
- Q91. Which of the following Bluetooth hacking techniques does an attacker use to send messages ...
- Q92. Which among the following is the best example of the third step (delivery) in the cyber ki...
- Q93. How can rainbow tables be defeated?
- Q94. Bob received this text message on his mobile phone: "Hello, this is Scott Smelby from the ...
- Q95. _________ is a tool that can hide processes from the process list, can hide files, registr...
- Q96. jane invites her friends Alice and John over for a LAN party. Alice and John access Jane's...
- Q97. What is the main security service a cryptographic hash provides?...
- Q98. While using your bank's online servicing you notice the following string in the URL bar: "...
- Q99. The configuration allows a wired or wireless network interface controller to pass all traf...
- Q100. Rebecca, a security professional, wants to authenticate employees who use web services for...
- Q101. jane, an ethical hacker. Is testing a target organization's web server and website to iden...
- Q102. Abel, a security professional, conducts penetration testing in his client organization to ...
- Q103. Juliet, a security researcher in an organization, was tasked with checking for the authent...
- Q104. What is the common name for a vulnerability disclosure program opened by companies In plat...
- Q105. A company's security policy states that all Web browsers must automatically delete their H...
- Q106. Email is transmitted across the Internet using the Simple Mail Transport Protocol. SMTP do...
- Q107. What is the known plaintext attack used against DES which gives the result that encrypting...
- Q108. Based on the below log, which of the following sentences are true? Mar 1, 2016, 7:33:28 AM...
- Q109. Nicolas just found a vulnerability on a public-facing system that is considered a zero-day...
- Q110. John, a disgruntled ex-employee of an organization, contacted a professional hacker to exp...
- Q111. Which of the following is the least-likely physical characteristic to be used in biometric...
- Q112. What is the following command used for? sqlmap.py-u ,,http://10.10.1.20/?p=1 &forumact...
- Q113. In Trojan terminology, what is a covert channel? (Exhibit)...
- Q114. John is investigating web-application firewall logs and observers that someone is attempti...
- Q115. An organization is performing a vulnerability assessment tor mitigating threats. James, a ...
- Q116. John wants to send Marie an email that includes sensitive information, and he does not tru...
- Q117. A large mobile telephony and data network operator has a data center that houses network e...
- Q118. Kevin, a professional hacker, wants to penetrate CyberTech Inc's network. He employed a te...
- Q119. John the Ripper is a technical assessment tool used to test the weakness of which of the f...
- Q120. Study the snort rule given below: (Exhibit) From the options below, choose the exploit aga...
- Q121. Larry, a security professional in an organization, has noticed some abnormalities in the u...
- Q122. You have been authorized to perform a penetration test against a website. You want to use ...
- Q123. You receive an e-mail like the one shown below. When you click on the link contained in th...
- Q124. Harry. a professional hacker, targets the IT infrastructure of an organization. After prep...
- Q125. Becky has been hired by a client from Dubai to perform a penetration test against one of t...
- Q126. Larry, a security professional in an organization, has noticed some abnormalities In the u...
- Q127. If a token and 4-digit personal identification number (PIN) are used to access a computer ...
- Q128. Hackers often raise the trust level of a phishing message by modeling the email to look si...
- Q129. This form of encryption algorithm is asymmetric key block cipher that is characterized by ...
- Q130. The configuration allows a wired or wireless network interface controller to pass all traf...
- Q131. #!/usr/bin/python import socket buffer=[""A""] counter=50 while len(buffer)<=100: buffe...
- Q132. PGP, SSL, and IKE are all examples of which type of cryptography?...
- Q133. Samuel a security administrator, is assessing the configuration of a web server. He notice...
- Q134. Upon establishing his new startup, Tom hired a cloud service provider (CSP) but was dissat...
- Q135. Mr. Omkar performed tool-based vulnerability assessment and found two vulnerabilities. Dur...
- Q136. Study the following log extract and identify the attack. (Exhibit)...
- Q137. You are logged in as a local admin on a Windows 7 system and you need to launch the Comput...
- Q138. Null sessions are un-authenticated connections (not using a username or password.) to an N...
- Q139. Abel, a security professional, conducts penetration testing in his client organization to ...
- Q140. A group of hackers were roaming around a bank office building in a city, driving a luxury ...
- Q141. Which of the following commands checks for valid users on an SMTP server?...
- Q142. Allen, a professional pen tester, was hired by XpertTech Solutions to perform an attack si...
- Q143. In Trojan terminology, what is a covert channel? (Exhibit)...
- Q144. A post-breach forensic investigation revealed that a known vulnerability in Apache Struts ...
- Q145. Robin, a professional hacker, targeted an organization's network to sniff all the traffic....
- Q146. By performing a penetration test, you gained access under a user account. During the test,...
- Q147. Consider the following Nmap output: Starting Nmap X.XX (http://nmap.org) at XXX-XX-XX XX:X...
- Q148. A regional bank hires your company to perform a security assessment on their network after...
- Q149. #!/usr/bin/python import socket buffer=[""A""] counter=50 while len(buffer)<=100: buffe...
- Q150. A group of hackers were roaming around a bank office building in a city, driving a luxury ...
- Q151. Switches maintain a CAM Table that maps individual MAC addresses on the network to physica...
- Q152. While performing online banking using a Web browser, a user receives an email that contain...
- Q153. Which file is a rich target to discover the structure of a website during web-server footp...
- Q154. A penetration tester is performing the footprinting process and is reviewing publicly avai...
- Q155. Johnson, an attacker, performed online research for the contact details of reputed cyberse...
- Q156. Attacker Rony Installed a rogue access point within an organization's perimeter and attemp...
- Q157. Abel, a security professional, conducts penetration testing in his client organization to ...
- Q158. Judy created a forum, one day. she discovers that a user is posting strange images without...
- Q159. Robin, a professional hacker, targeted an organization's network to sniff all the traffic....
- Q160. Bobby, an attacker, targeted a user and decided to hijack and intercept all their wireless...
- Q161. Based on the following extract from the log of a compromised machine, what is the hacker r...
- Q162. Attacker Steve targeted an organization's network with the aim of redirecting the company'...
- Q163. An attacker identified that a user and an access point are both compatible with WPA2 and W...
- Q164. Robin, an attacker, is attempting to bypass the firewalls of an organization through the D...
- Q165. Nicolas just found a vulnerability on a public-facing system that is considered a zero-day...
- Q166. John, a disgruntled ex-employee of an organization, contacted a professional hacker to exp...
- Q167. Sam is working as a system administrator in an organization. He captured the principal cha...
- Q168. SQL injection (SQLi) attacks attempt to inject SQL syntax into web requests, which may Byp...
- Q169. Gerard, a disgruntled ex-employee of Sunglass IT Solutions, targets this organization to p...
- Q170. A regional bank hires your company to perform a security assessment on their network after...
- Q171. Stella, a professional hacker, performs an attack on web services by exploiting a vulnerab...
- Q172. what firewall evasion scanning technique make use of a zombie system that has low network ...
- Q173. Heather's company has decided to use a new customer relationship management tool. After pe...
- Q174. Ricardo has discovered the username for an application in his targets environment. As he h...
- Q175. Ron, a security professional, was pen testing web applications and SaaS platforms used by ...
- Q176. Bob, your senior colleague, has sent you a mail regarding a deal with one of the clients. ...
- Q177. Which type of malware spreads from one system to another or from one network to another an...
- Q178. Morris, an attacker, wanted to check whether the target AP is in a locked state. He attemp...
- Q179. _________ is a type of phishing that targets high-profile executives such as CEOs, CFOs, p...
- Q180. Robin, an attacker, is attempting to bypass the firewalls of an organization through the D...
- Q181. You are trying to break into a highly classified top-secret mainframe computer with highes...
- Q182. Annie, a cloud security engineer, uses the Docker architecture to employ a client/server m...
- Q183. This wireless security protocol allows 192-bit minimum-strength security protocols and cry...
- Q184. What ports should be blocked on the firewall to prevent NetBIOS traffic from not coming th...
- Q185. During the enumeration phase. Lawrence performs banner grabbing to obtain information such...
- Q186. While performing online banking using a Web browser, a user receives an email that contain...
- Q187. Garry is a network administrator in an organization. He uses SNMP to manage networked devi...
- Q188. Which of the following statements about a zone transfer is correct? (Choose three.)...
- Q189. Josh has finished scanning a network and has discovered multiple vulnerable services. He k...
- Q190. ViruXine.W32 virus hides their presence by changing the underlying executable code. This V...
- Q191. What is the way to decide how a packet will move from an untrusted outside host to a prote...
- Q192. Jim, a professional hacker, targeted an organization that is operating critical Industrial...
- Q193. Andrew is an Ethical Hacker who was assigned the task of discovering all the active device...
- Q194. joe works as an it administrator in an organization and has recently set up a cloud comput...
- Q195. Which of the following programming languages is most susceptible to buffer overflow attack...
- Q196. Jim, a professional hacker, targeted an organization that is operating critical industrial...
- Q197. Alice needs to send a confidential document to her coworker. Bryan. Their company has publ...
- Q198. Security administrator John Smith has noticed abnormal amounts of traffic coming from loca...
- Q199. An attacker, using a rogue wireless AP, performed an MITM attack and injected an HTML code...
- Q200. Mary found a high vulnerability during a vulnerability scan and notified her server team. ...
- Q201. Why containers are less secure that virtual machines?...
- Q202. What would be the fastest way to perform content enumeration on a given web server by usin...
- Q203. Which Nmap option would you use if you were not concerned about being detected and wanted ...
- Q204. Annie, a cloud security engineer, uses the Docker architecture to employ a client/server m...
- Q205. Geena, a cloud architect, uses a master component in the Kubernetes cluster architecture t...
- Q206. What piece of hardware on a computer's motherboard generates encryption keys and only rele...
- Q207. In the field of cryptanalysis, what is meant by a "rubber-hose" attack?...
- Q208. John, a professional hacker, decided to use DNS to perform data exfiltration on a target n...
- Q209. Don, a student, came across a gaming app in a third-party app store and Installed it. Subs...
- Q210. Don, a student, came across a gaming app in a third-party app store and Installed it. Subs...
- Q211. You are a security officer of a company. You had an alert from IDS that indicates that one...
- Q212. During the process of encryption and decryption, what keys are shared? During the process ...
- Q213. Leverox Solutions hired Arnold, a security professional, for the threat intelligence proce...
- Q214. Eric, a cloud security engineer, implements a technique for securing the cloud resources u...
- Q215. You are a penetration tester and are about to perform a scan on a specific server. The agr...
- Q216. Which IOS jailbreaking technique patches the kernel during the device boot so that it beco...
- Q217. A security analyst uses Zenmap to perform an ICMP timestamp ping scan to acquire informati...
- Q218. If you send a TCP ACK segment to a known closed port on a firewall but it does not respond...
- Q219. Steve, an attacker, created a fake profile on a social media website and sent a request to...
- Q220. To hide the file on a Linux system, you have to start the filename with a specific charact...
- Q221. Internet Protocol Security IPsec is actually a suite pf protocols. Each protocol within th...
- Q222. Henry Is a cyber security specialist hired by BlackEye - Cyber security solutions. He was ...
- Q223. An organization has automated the operation of critical infrastructure from a remote locat...
- Q224. Gerard, a disgruntled ex-employee of Sunglass IT Solutions, targets this organization to p...
- Q225. What kind of detection techniques is being used in antivirus software that identifies malw...
- Q226. You are a penetration tester and are about to perform a scan on a specific server. The agr...
- Q227. Peter is surfing the internet looking for information about DX Company. Which hacking proc...
- Q228. You are logged in as a local admin on a Windows 7 system, and you need to launch the Compu...
- Q229. Some clients of TPNQM SA were redirected to a malicious site when they tried to access the...
- Q230. An attacker redirects the victim to malicious websites by sending them a malicious link by...
- Q231. Firewalk has just completed the second phase (the scanning phase) and a technician receive...
- Q232. An attacker redirects the victim to malicious websites by sending them a malicious link by...
- Q233. George is a security professional working for iTech Solutions. He was tasked with securely...
- Q234. Which of the following steps for risk assessment methodology refers to vulnerability ident...
- Q235. Tony is a penetration tester tasked with performing a penetration test. After gaining init...
- Q236. Windows LAN Manager (LM) hashes are known to be weak. Which of the following are known wea...
- Q237. Bob was recently hired by a medical company after it experienced a major cyber security br...
- Q238. An organization is performing a vulnerability assessment tor mitigating threats. James, a ...
- Q239. A friend of yours tells you that he downloaded and executed a file that was sent to him by...
- Q240. Attempting an injection attack on a web server based on responses to True/False Question: ...
- Q241. An attacker, using a rogue wireless AP, performed an MITM attack and injected an HTML code...
- Q242. if you send a TCP ACK segment to a known closed port on a firewall but it does not respond...
- Q243. When considering how an attacker may exploit a web server, what is web server footprinting...
- Q244. You receive an e-mail like the one shown below. When you click on the link contained in th...
- Q245. Jane invites her friends Alice and John over for a LAN party. Alice and John access Jane's...
- Q246. A DDOS attack is performed at layer 7 to take down web infrastructure. Partial HTTP reques...
- Q247. Daniel Is a professional hacker who Is attempting to perform an SQL injection attack on a ...
- Q248. Ethical hacker jane Smith is attempting to perform an SQL injection attach. She wants to t...
- Q249. which of the following information security controls creates an appealing isolated environ...
- Q250. Sam is working as a system administrator In an organization. He captured the principal cha...
- Q251. Which of the following LM hashes represent a password of less than 8 characters? (Choose t...
- Q252. In an internal security audit, the white hat hacker gains control over a user account and ...
- Q253. What is the BEST alternative if you discover that a rootkit has been installed on one of y...
- Q254. You are tasked to configure the DHCP server to lease the last 100 usable IP addresses in s...
- Q255. Attacker Lauren has gained the credentials of an organization's internal server system, an...
- Q256. Robin, a professional hacker, targeted an organization's network to sniff all the traffic....
- Q257. Which Intrusion Detection System is best applicable for large environments where critical ...
- Q258. As a securing consultant, what are some of the things you would recommend to a company to ...
- Q259. A large company intends to use Blackberry for corporate mobile phones and a security analy...
- Q260. Susan, a software developer, wants her web API to update other applications with the lates...
- Q261. Gavin owns a white-hat firm and is performing a website security audit for one of his clie...
- Q262. What is the following command used for? net use \targetipc$ "" /u:""...
- Q263. You want to do an ICMP scan on a remote computer using hping2. What is the proper syntax?...
- Q264. Which of the following Google advanced search operators helps an attacker in gathering inf...
- Q265. Which type of security feature stops vehicles from crashing through the doors of a buildin...
- Q266. Nicolas just found a vulnerability on a public-facing system that is considered a zero-day...
- Q267. Bella, a security professional working at an it firm, finds that a security breach has occ...
- Q268. In an attempt to damage the reputation of a competitor organization, Hailey, a professiona...
- Q269. Abel, a cloud architect, uses container technology to deploy applications/software includi...
- Q270. Don, a student, came across a gaming app in a third-party app store and Installed it. Subs...
- Q271. Richard, an attacker, aimed to hack IoT devices connected to a target network. In this pro...
- Q272. During the enumeration phase. Lawrence performs banner grabbing to obtain information such...
- Q273. Attacker Steve targeted an organization's network with the aim of redirecting the company'...
- Q274. Fred is the network administrator for his company. Fred is testing an internal switch. Fro...
- Q275. Joe works as an IT administrator in an organization and has recently set up a cloud comput...
- Q276. After an audit, the auditors Inform you that there is a critical finding that you must tac...
- Q277. Clark, a professional hacker, was hired by an organization lo gather sensitive Information...
- Q278. Take a look at the following attack on a Web Server using obstructed URL: (Exhibit) How wo...
- Q279. Louis, a professional hacker, had used specialized tools or search engines to encrypt all ...
- Q280. Emily, an extrovert obsessed with social media, posts a large amount of private informatio...
- Q281. Louis, a professional hacker, had used specialized tools or search engines to encrypt all ...
- Q282. An attacker identified that a user and an access point are both compatible with WPA2 and W...
- Q283. What is the file that determines the basic configuration (specifically activities, service...
- Q284. Which of the following allows attackers to draw a map or outline the target organization's...
- Q285. What does the following command in netcat do? nc -l -u -p55555 < /etc/passwd...
- Q286. Infecting a system with malware and using phishing to gain credentials to a system or web ...
- Q287. In the Common Vulnerability Scoring System (CVSS) v3.1 severity ratings, what range does m...
- Q288. While using your bank's online servicing you notice the following string in the URL bar: "...
- Q289. You are using a public Wi-Fi network inside a coffee shop. Before surfing the web, you use...
- Q290. Why is a penetration test considered to be more thorough than vulnerability scan?...
- Q291. Susan, a software developer, wants her web API to update other applications with the lates...
- Q292. Sam is a penetration tester hired by Inception Tech, a security organization. He was asked...
- Q293. What is the minimum number of network connections in a multi homed firewall?...
- Q294. Attacker Lauren has gained the credentials of an organization's internal server system, an...
- Q295. Techno Security Inc. recently hired John as a penetration tester. He was tasked with ident...
- Q296. George is a security professional working for iTech Solutions. He was tasked with securely...
- Q297. Which of the following is a passive wireless packet analyzer that works on Linux-based sys...
- Q298. Internet Protocol Security IPsec is actually a suite pf protocols. Each protocol within th...
- Q299. Internet Protocol Security IPsec is actually a suite pf protocols. Each protocol within th...
- Q300. A network admin contacts you. He is concerned that ARP spoofing or poisoning might occur o...
- Q301. An LDAP directory can be used to store information similar to a SQL database. LDAP uses a ...
- Q302. Heather's company has decided to use a new customer relationship management tool. After pe...
- Q303. Bob, your senior colleague, has sent you a mail regarding a deal with one of the clients. ...
- Q304. if you send a TCP ACK segment to a known closed port on a firewall but it does not respond...
- Q305. Which of the following is assured by the use of a hash?...
- Q306. A network administrator discovers several unknown files in the root directory of his Linux...
- Q307. John, a professional hacker, performs a network attack on a renowned organization and gain...
- Q308. George is a security professional working for iTech Solutions. He was tasked with securely...
- Q309. You are a penetration tester working to test the user awareness of the employees of the cl...
- Q310. in this attack, an adversary tricks a victim into reinstalling an already-in-use key. This...
- Q311. Jake, a professional hacker, installed spyware on a target iPhone to spy on the target use...
- Q312. Although FTP traffic is not encrypted by default, which layer 3 protocol would allow for e...
- Q313. Becky has been hired by a client from Dubai to perform a penetration test against one of t...
- Q314. What is the proper response for a NULL scan if the port is open?...
- Q315. Which file is a rich target to discover the structure of a website during web-server footp...
- Q316. Scenario1: 1. Victim opens the attacker's web site. 2. Attacker sets up a web site which c...
- Q317. Gilbert, a web developer, uses a centralized web API to reduce complexity and increase the...
- Q318. An organization is performing a vulnerability assessment tor mitigating threats. James, a ...
- Q319. Johnson, an attacker, performed online research for the contact details of reputed cyberse...
- Q320. George is a security professional working for iTech Solutions. He was tasked with securely...
- Q321. Which of the following is a low-tech way of gaining unauthorized access to systems?...
- Q322. Sophia is a shopping enthusiast who spends significant time searching for trendy outfits o...
- Q323. Bella, a security professional working at an it firm, finds that a security breach has occ...
- Q324. Which of the following commands checks for valid users on an SMTP server?...
- Q325. Which among the following is the best example of the hacking concept called "clearing trac...
- Q326. A company's policy requires employees to perform file transfers using protocols which encr...
- Q327. Samuel a security administrator, is assessing the configuration of a web server. He notice...
- Q328. Dorian is sending a digitally signed email to Poly. With which key is Dorian signing this ...
- Q329. _________ is a set of extensions to DNS that provide the origin authentication of DNS data...
- Q330. Andrew is an Ethical Hacker who was assigned the task of discovering all the active device...
